Analysis

  • max time kernel
    141s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-11-2023 14:35

General

  • Target

    82edbc5dd9d64f648679e486c39ec1a7adbd32b13b7ad7af21efa2608a87178e.exe

  • Size

    1.1MB

  • MD5

    127d7122e2d4550e0a7bfeb19ed0b711

  • SHA1

    464458bb7f20015cbc37ca6459f680360f4ef170

  • SHA256

    82edbc5dd9d64f648679e486c39ec1a7adbd32b13b7ad7af21efa2608a87178e

  • SHA512

    cc785bc68d110fdd2c2a2452970cb57d2d96277e47794909e5ba3e364a4c0030f11caa4316ceed6367aa5ee72958d104f0c5f4f947c455357237ddff168bb446

  • SSDEEP

    24576:LyyDG1vWvnHfIDvZF+55rfzZY2mb3OuFxpVqGJG4S/sj1PZVsEQ8q:+yDG1vwn/IbjV3OuFxpXA4SUj1PZVv/

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Signatures

  • Detect Mystic stealer payload 4 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • .NET Reactor proctector 20 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\82edbc5dd9d64f648679e486c39ec1a7adbd32b13b7ad7af21efa2608a87178e.exe
    "C:\Users\Admin\AppData\Local\Temp\82edbc5dd9d64f648679e486c39ec1a7adbd32b13b7ad7af21efa2608a87178e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:856
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Hi2QW00.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Hi2QW00.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3648
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\OB7wV41.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\OB7wV41.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2900
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\11RV3981.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\11RV3981.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4852
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
              PID:636
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 636 -s 200
                6⤵
                • Program crash
                PID:3052
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\12sN384.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\12sN384.exe
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2588
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              5⤵
                PID:3888
          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\13Fh325.exe
            C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\13Fh325.exe
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:3776
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:3728
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\9RX67zn0.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\9RX67zn0.exe
          2⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5116
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 636 -ip 636
        1⤵
          PID:2180

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\9RX67zn0.exe

          Filesize

          189KB

          MD5

          f4af3a9bb5b128ea7f4a49016ae8de1f

          SHA1

          77e47932af41b3af5bfff73d2a4c9773dc224f0d

          SHA256

          195fa6ff08dd55ff8f112c0323885bc06e1d28ce38edae26cce1e33b23337ff1

          SHA512

          1067017da68040e8e1eab228773c37cba180731f8792462d94e1e52cc12eb63e5306b3ffbc1fb4f0047a9d29e8a060649b5914bb25ece9c2c37b75e143c50df2

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\9RX67zn0.exe

          Filesize

          189KB

          MD5

          f4af3a9bb5b128ea7f4a49016ae8de1f

          SHA1

          77e47932af41b3af5bfff73d2a4c9773dc224f0d

          SHA256

          195fa6ff08dd55ff8f112c0323885bc06e1d28ce38edae26cce1e33b23337ff1

          SHA512

          1067017da68040e8e1eab228773c37cba180731f8792462d94e1e52cc12eb63e5306b3ffbc1fb4f0047a9d29e8a060649b5914bb25ece9c2c37b75e143c50df2

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Hi2QW00.exe

          Filesize

          887KB

          MD5

          b6be02ef4564760f119a4f20ff560969

          SHA1

          71bf063b51c11abf1c9b9a0453b1b8f3c4dd3eea

          SHA256

          34f53479ce8d660a991edc0401fe31df0a46665647f13cab94e3712ff5c36f67

          SHA512

          ff574f84ba2b1a3a25b559a771c1696e3e2afc6cff614b90758ed075d7c2818af2a2fd68a8f429d759eebec65b245f45e54a565a08d9ff8ba8d205d09273a27f

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Hi2QW00.exe

          Filesize

          887KB

          MD5

          b6be02ef4564760f119a4f20ff560969

          SHA1

          71bf063b51c11abf1c9b9a0453b1b8f3c4dd3eea

          SHA256

          34f53479ce8d660a991edc0401fe31df0a46665647f13cab94e3712ff5c36f67

          SHA512

          ff574f84ba2b1a3a25b559a771c1696e3e2afc6cff614b90758ed075d7c2818af2a2fd68a8f429d759eebec65b245f45e54a565a08d9ff8ba8d205d09273a27f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\13Fh325.exe

          Filesize

          717KB

          MD5

          cd3955eecfa46053e4d2764945a4098e

          SHA1

          32d9cab47a3ea49dde458e41d5ac57746e4e78ec

          SHA256

          1c056d943b20cd37e97030e3a9505cb58dbeccdd902427146220e4378205ec81

          SHA512

          bd31219778cb6b1c74e9aa79df52821c501523d59d50e60d00600e01065c3c8b4eb7d9a217499d60ff3c1ce2ebf0a86cc55654a22777e88e1251bf84d63546e0

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\13Fh325.exe

          Filesize

          717KB

          MD5

          cd3955eecfa46053e4d2764945a4098e

          SHA1

          32d9cab47a3ea49dde458e41d5ac57746e4e78ec

          SHA256

          1c056d943b20cd37e97030e3a9505cb58dbeccdd902427146220e4378205ec81

          SHA512

          bd31219778cb6b1c74e9aa79df52821c501523d59d50e60d00600e01065c3c8b4eb7d9a217499d60ff3c1ce2ebf0a86cc55654a22777e88e1251bf84d63546e0

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\OB7wV41.exe

          Filesize

          426KB

          MD5

          1bc19e736f7d6f811c841ba5210371ae

          SHA1

          8956abb2ffd238b86f9ea1debadc5a921e3428af

          SHA256

          e7d1d095f15cc29b7e8fc430e853ccb6eea752871d9060875d0d6099a0941a95

          SHA512

          083ef8a1f1984d43657390084002a90787a3162ce1b674fed80ff48a5f3f67b22558b5ae22cccaa271d91c53055cf6802f18eef342d94b13f4e5293aab44c07f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\OB7wV41.exe

          Filesize

          426KB

          MD5

          1bc19e736f7d6f811c841ba5210371ae

          SHA1

          8956abb2ffd238b86f9ea1debadc5a921e3428af

          SHA256

          e7d1d095f15cc29b7e8fc430e853ccb6eea752871d9060875d0d6099a0941a95

          SHA512

          083ef8a1f1984d43657390084002a90787a3162ce1b674fed80ff48a5f3f67b22558b5ae22cccaa271d91c53055cf6802f18eef342d94b13f4e5293aab44c07f

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\11RV3981.exe

          Filesize

          369KB

          MD5

          1b6270ce4f03bd61360cb64e18ce3d7e

          SHA1

          94a8994c2e8712de0b067687f58de943746da97d

          SHA256

          f0fc775842b5b6eb80c84873dbd6323bad6ae30c155a3abe48dfe323386d1231

          SHA512

          884b4c61edd4661968d39b44f4cce99c55fb7a3d66e4366c92f2fc4500e170ecc1fa91b54d4d16c92e552c1b632fd676dc6f80f412602b03a72b10925a6ed286

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\11RV3981.exe

          Filesize

          369KB

          MD5

          1b6270ce4f03bd61360cb64e18ce3d7e

          SHA1

          94a8994c2e8712de0b067687f58de943746da97d

          SHA256

          f0fc775842b5b6eb80c84873dbd6323bad6ae30c155a3abe48dfe323386d1231

          SHA512

          884b4c61edd4661968d39b44f4cce99c55fb7a3d66e4366c92f2fc4500e170ecc1fa91b54d4d16c92e552c1b632fd676dc6f80f412602b03a72b10925a6ed286

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\12sN384.exe

          Filesize

          408KB

          MD5

          8de6d750ad9a4d9f47b31ab4367ef0eb

          SHA1

          f86299b4bedd0476e724ec388f1dc560a9398984

          SHA256

          49fe01fed361a7cc5d7732a55b823666888652aead51f35240a5f51e7ebcb95e

          SHA512

          b7cacdad03fcfa17fff85322c477562291acbaaed32afbc25ffb19a1645b6ca7670045acf1130c11269105806e6e3731c946175bafd6436c48fa93ca81e617f3

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\12sN384.exe

          Filesize

          408KB

          MD5

          8de6d750ad9a4d9f47b31ab4367ef0eb

          SHA1

          f86299b4bedd0476e724ec388f1dc560a9398984

          SHA256

          49fe01fed361a7cc5d7732a55b823666888652aead51f35240a5f51e7ebcb95e

          SHA512

          b7cacdad03fcfa17fff85322c477562291acbaaed32afbc25ffb19a1645b6ca7670045acf1130c11269105806e6e3731c946175bafd6436c48fa93ca81e617f3

        • memory/636-27-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/636-23-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/636-22-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/636-21-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/3728-45-0x0000000000400000-0x0000000000488000-memory.dmp

          Filesize

          544KB

        • memory/3728-53-0x0000000000400000-0x0000000000488000-memory.dmp

          Filesize

          544KB

        • memory/3728-50-0x0000000000400000-0x0000000000488000-memory.dmp

          Filesize

          544KB

        • memory/3728-48-0x0000000000400000-0x0000000000488000-memory.dmp

          Filesize

          544KB

        • memory/3888-39-0x0000000007FB0000-0x00000000080BA000-memory.dmp

          Filesize

          1.0MB

        • memory/3888-38-0x0000000008D40000-0x0000000009358000-memory.dmp

          Filesize

          6.1MB

        • memory/3888-40-0x0000000007EE0000-0x0000000007EF2000-memory.dmp

          Filesize

          72KB

        • memory/3888-41-0x0000000007F40000-0x0000000007F7C000-memory.dmp

          Filesize

          240KB

        • memory/3888-42-0x00000000080C0000-0x000000000810C000-memory.dmp

          Filesize

          304KB

        • memory/3888-43-0x0000000074550000-0x0000000074D00000-memory.dmp

          Filesize

          7.7MB

        • memory/3888-44-0x0000000007C30000-0x0000000007C40000-memory.dmp

          Filesize

          64KB

        • memory/3888-34-0x0000000008170000-0x0000000008714000-memory.dmp

          Filesize

          5.6MB

        • memory/3888-33-0x0000000074550000-0x0000000074D00000-memory.dmp

          Filesize

          7.7MB

        • memory/3888-37-0x0000000007E00000-0x0000000007E0A000-memory.dmp

          Filesize

          40KB

        • memory/3888-29-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/3888-35-0x0000000007C60000-0x0000000007CF2000-memory.dmp

          Filesize

          584KB

        • memory/3888-36-0x0000000007C30000-0x0000000007C40000-memory.dmp

          Filesize

          64KB

        • memory/5116-57-0x0000000004F50000-0x0000000004F69000-memory.dmp

          Filesize

          100KB

        • memory/5116-68-0x0000000004F50000-0x0000000004F69000-memory.dmp

          Filesize

          100KB

        • memory/5116-55-0x0000000074550000-0x0000000074D00000-memory.dmp

          Filesize

          7.7MB

        • memory/5116-56-0x0000000004940000-0x0000000004950000-memory.dmp

          Filesize

          64KB

        • memory/5116-51-0x00000000048C0000-0x00000000048E0000-memory.dmp

          Filesize

          128KB

        • memory/5116-59-0x0000000004F50000-0x0000000004F69000-memory.dmp

          Filesize

          100KB

        • memory/5116-58-0x0000000004940000-0x0000000004950000-memory.dmp

          Filesize

          64KB

        • memory/5116-60-0x0000000004940000-0x0000000004950000-memory.dmp

          Filesize

          64KB

        • memory/5116-62-0x0000000004F50000-0x0000000004F69000-memory.dmp

          Filesize

          100KB

        • memory/5116-64-0x0000000004F50000-0x0000000004F69000-memory.dmp

          Filesize

          100KB

        • memory/5116-66-0x0000000004F50000-0x0000000004F69000-memory.dmp

          Filesize

          100KB

        • memory/5116-54-0x0000000004F50000-0x0000000004F6E000-memory.dmp

          Filesize

          120KB

        • memory/5116-70-0x0000000004F50000-0x0000000004F69000-memory.dmp

          Filesize

          100KB

        • memory/5116-72-0x0000000004F50000-0x0000000004F69000-memory.dmp

          Filesize

          100KB

        • memory/5116-74-0x0000000004F50000-0x0000000004F69000-memory.dmp

          Filesize

          100KB

        • memory/5116-76-0x0000000004F50000-0x0000000004F69000-memory.dmp

          Filesize

          100KB

        • memory/5116-78-0x0000000004F50000-0x0000000004F69000-memory.dmp

          Filesize

          100KB

        • memory/5116-80-0x0000000004F50000-0x0000000004F69000-memory.dmp

          Filesize

          100KB

        • memory/5116-82-0x0000000004F50000-0x0000000004F69000-memory.dmp

          Filesize

          100KB

        • memory/5116-84-0x0000000004F50000-0x0000000004F69000-memory.dmp

          Filesize

          100KB

        • memory/5116-86-0x0000000004F50000-0x0000000004F69000-memory.dmp

          Filesize

          100KB

        • memory/5116-88-0x0000000004F50000-0x0000000004F69000-memory.dmp

          Filesize

          100KB

        • memory/5116-90-0x0000000004F50000-0x0000000004F69000-memory.dmp

          Filesize

          100KB

        • memory/5116-92-0x0000000074550000-0x0000000074D00000-memory.dmp

          Filesize

          7.7MB